Regulation and the  Internet of Things  15 Global Symposium for 

advertisement
Regulation and the Internet of Things 15th Global Symposium for Regulators (GSR15)
Prof. Ian Brown
The views expressed in this presentation are those of the author and do not necessarily reflect the opinions of the ITU or its Membership.
DEFINITIONS
• ITU‐T: “A global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.” • Concretely: remotely linked tags, sensors and actuators, increasingly being built into objects throughout the physical world, driven by ongoing rapid falls in the cost of microchips, sensors and communications capacity. • Protocols: NFC, RFID, medical implants, M2M dedicated networks, ZigBee, Bluetooth, 2G/3G/4G, Wi‐Fi, ITS • Expectations that tens of billions of IoT devices deployed in next decade, driving economic value in $trillions
1
POPULAR APPLICATIONS
Individual
Level
IoT
Smartphones
Wearables
Egs.
GPS, Fitbits
Visa PayWave
Mastercard Paypass
Employee passes
Data
Mobile money
Fitness data, GPS location‐based data
Intended
Audience
Individual
person
Immediate friends/ family; banks; employers
Community
Society
Connected Cars
Health devices
Smart homes
Intelligent Transport Systems Event Data Recorders (EDRs)
Blood pressure monitors;
remote burglar/heating systems
Smart Cities
Smart Grids
Smart metering;
Smart water meters
Traffic monitoring
Speed, distance, airbag, crash locations/alerts;
Heart rate, blood pressure,
Diet; remote heating data Electricity/water consumption & billing;
Traffic flow data
GP, health authorities;
health & car insurance; Police
Wider friends, social networks Authorities/regulators
Utility companies;
Other citizens
Internet of Things
2
REGULATORY ISSUES
•
•
•
•
•
Licensing and spectrum management
Switching and roaming
Addressing and numbering
Competition
Security and privacy
LICENSING AND SPECTRUM MANAGEMENT
Goal: Ensure spectrum is available for a wide range of IoT applications, at short and long range, in licensed and unlicensed bands. Best practice: Monitor availability of spectrum for short and long‐
range IoT communications and backhaul network capacity.
Encourage 4G deployment and use of small‐cell technology. Potential measures: Further experimentation with use of white space and shared‐space technology.
Encourage development of LTE‐A and 5G networks, and keep need for IoT‐specific spectrum under review. 3
SWITCHING AND ROAMING
Goal: Encourage development of SIMs and mobile network accounts suitable for large M2M users, roaming mobile devices, and fixed devices in areas of poor reception. Best practice: Mobile network operators develop M2M‐specific business units with appropriate billing and management.
Further development and deployment of embedded, remotely provisioned SIMs in M2M systems. Potential measures: Global agreement on updated E.212 standards, making appropriate use of GSMA standards.
Provision of Mobile Network Codes to IoT service providers.
Source: ITU.
ADDRESSING AND NUMBERING
Goal: Large address space needed for globally addressable things (although many IoT devices only need local connectivity). Best practice: Deployment of IPv6 by ISPs, public and private sector organisations.
Use of IMSI for M2M applications. Potential measures: Universal IPv6 adoption by governments in their own services and procurements, and other incentives for private sector adoption. 4
COMPETITION
Goal: Avoid IoT user lock‐in and new barriers to entry.
Best practice: Ensure competition regulators have capability to monitor IoT markets for abuses of dominant positions.
Provide institutional mechanism for ongoing review of laws and regulations for impact on IoT competitiveness. Potential measures: Consider measures to increase interoperability through competition and consumer law.
Give users a right to easy access to raw data. Support global standardisation and deployment of remotely provisioned SIMs for greater M2M competition. SECURITY AND PRIVACY
Goal: Significantly reduce security vulnerabilities in IoT systems let attackers access private data and cause physical harm in cases such as medical devices and connected vehicles.
Encourage security and vulnerability patching of devices.
Smart city vulnerabilities can be hard to fix but present significant safety issues (e.g. in traffic lights).
Ensure individual control of profiles, which can be used to infer sensitive personal information, such as medical disorders. Reduce potential for discrimination in employment, financial and healthcare services. Best practice: Ensuring security and privacy from outset of IoT system design process.
Development of co‐regulation by all stakeholders to protect security and privacy.
Further development of privacy and consumer protection rules to ensure security testing of IoT systems that process sensitive personal data. 5
SECURITY AND PRIVACY ‐ POTENTIAL MEASURES
• R&D on more hardware and software security and privacy mechanisms for resource‐constrained IoT systems, particularly targeted towards start‐ups and individual entrepreneurs that lack resources to easily develop this functionality.
• Incentives for companies to develop new mechanisms to improve transparency of IoT personal data use, and for gaining informed consent from individuals concerned when sensitive data is gathered or inferences drawn.
• Greater use of Privacy Impact Assessments by organisations building and configuring IoT systems.
• Development of further guidance from global privacy regulators on application of the principles of data minimisation and purpose limitation in IoT systems.
• More cooperation between telecoms and other regulators such as privacy/data protection agencies.
6
Download